城市(city): unknown
省份(region): unknown
国家(country): United States
运营商(isp): unknown
主机名(hostname): unknown
机构(organization): unknown
使用类型(Usage Type): unknown
b
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 199.119.29.4
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 22007
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;199.119.29.4. IN A
;; AUTHORITY SECTION:
. 140 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2022021800 1800 900 604800 86400
;; Query time: 16 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri Feb 18 23:03:42 CST 2022
;; MSG SIZE rcvd: 105
4.29.119.199.in-addr.arpa domain name pointer gwinnett.k12.ga.us.
Server: 183.60.83.19
Address: 183.60.83.19#53
Non-authoritative answer:
4.29.119.199.in-addr.arpa name = gwinnett.k12.ga.us.
Authoritative answers can be found from:
| IP | 类型 | 评论内容 | 时间 |
|---|---|---|---|
| 49.233.145.188 | attackspambots | Invalid user inna from 49.233.145.188 port 38190 |
2020-07-25 19:09:17 |
| 167.172.238.159 | attack | Jul 25 12:53:11 srv-ubuntu-dev3 sshd[34036]: Invalid user monte from 167.172.238.159 Jul 25 12:53:11 srv-ubuntu-dev3 sshd[34036]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=167.172.238.159 Jul 25 12:53:11 srv-ubuntu-dev3 sshd[34036]: Invalid user monte from 167.172.238.159 Jul 25 12:53:14 srv-ubuntu-dev3 sshd[34036]: Failed password for invalid user monte from 167.172.238.159 port 32962 ssh2 Jul 25 12:57:02 srv-ubuntu-dev3 sshd[34456]: Invalid user admin from 167.172.238.159 Jul 25 12:57:02 srv-ubuntu-dev3 sshd[34456]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=167.172.238.159 Jul 25 12:57:02 srv-ubuntu-dev3 sshd[34456]: Invalid user admin from 167.172.238.159 Jul 25 12:57:04 srv-ubuntu-dev3 sshd[34456]: Failed password for invalid user admin from 167.172.238.159 port 46432 ssh2 Jul 25 13:00:57 srv-ubuntu-dev3 sshd[34930]: Invalid user cwc from 167.172.238.159 ... |
2020-07-25 19:19:08 |
| 58.152.196.192 | attackbotsspam | SSH/22 MH Probe, BF, Hack - |
2020-07-25 19:34:10 |
| 209.85.166.194 | attackspambots | B2B list seller spam from jennifer@onedatasonline.com |
2020-07-25 19:33:03 |
| 46.101.200.68 | attackspam | Invalid user wangmeng from 46.101.200.68 port 49656 |
2020-07-25 19:26:30 |
| 142.93.103.141 | attackspambots | 2020-07-25T07:27:15.811789randservbullet-proofcloud-66.localdomain sshd[7443]: Invalid user dev from 142.93.103.141 port 42888 2020-07-25T07:27:15.816093randservbullet-proofcloud-66.localdomain sshd[7443]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=142.93.103.141 2020-07-25T07:27:15.811789randservbullet-proofcloud-66.localdomain sshd[7443]: Invalid user dev from 142.93.103.141 port 42888 2020-07-25T07:27:17.767384randservbullet-proofcloud-66.localdomain sshd[7443]: Failed password for invalid user dev from 142.93.103.141 port 42888 ssh2 ... |
2020-07-25 19:27:45 |
| 34.93.0.165 | attackspambots | 2020-07-25T07:08:49.943534mail.thespaminator.com sshd[30397]: Invalid user alberto from 34.93.0.165 port 55318 2020-07-25T07:08:51.652670mail.thespaminator.com sshd[30397]: Failed password for invalid user alberto from 34.93.0.165 port 55318 ssh2 ... |
2020-07-25 19:18:37 |
| 106.53.86.116 | attackbots | detected by Fail2Ban |
2020-07-25 19:22:22 |
| 113.235.123.212 | attackbots | Jul 22 07:35:42 xxxxxxx8 sshd[16813]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=113.235.123.212 user=www-data Jul 22 07:35:44 xxxxxxx8 sshd[16813]: Failed password for www-data from 113.235.123.212 port 57544 ssh2 Jul 22 07:38:30 xxxxxxx8 sshd[16867]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=113.235.123.212 user=admin Jul 22 07:38:32 xxxxxxx8 sshd[16867]: Failed password for admin from 113.235.123.212 port 38174 ssh2 Jul 22 07:41:19 xxxxxxx8 sshd[17329]: Invalid user luky from 113.235.123.212 port 46860 Jul 22 07:41:19 xxxxxxx8 sshd[17329]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=113.235.123.212 Jul 22 07:41:22 xxxxxxx8 sshd[17329]: Failed password for invalid user luky from 113.235.123.212 port 46860 ssh2 Jul 22 07:44:09 xxxxxxx8 sshd[17397]: Invalid user parserverag from 113.235.123.212 port 55540 Jul 22 07:44:09 xxxxxxx8 sshd[1........ ------------------------------ |
2020-07-25 19:20:23 |
| 120.70.97.233 | attackbotsspam | sshd: Failed password for invalid user .... from 120.70.97.233 port 51906 ssh2 (5 attempts) |
2020-07-25 19:10:16 |
| 49.235.91.59 | attackbots | 2020-07-25T15:44:05.726967hostname sshd[84221]: Invalid user ftpaccess from 49.235.91.59 port 50900 ... |
2020-07-25 19:37:56 |
| 178.62.101.143 | attack | Invalid user jonathan from 178.62.101.143 port 49202 |
2020-07-25 19:06:46 |
| 51.83.251.120 | attackspam | Invalid user sam from 51.83.251.120 port 33870 |
2020-07-25 19:20:47 |
| 201.209.73.253 | attackspambots | SSH/22 MH Probe, BF, Hack - |
2020-07-25 19:35:58 |
| 139.99.84.85 | attackbots | Invalid user yog from 139.99.84.85 port 56558 |
2020-07-25 19:41:55 |